Functions & Types of Cloud Access Security Broker (CASB)

Cyber Security Entertainment
Cyber Security Entertainment
119 بار بازدید - پارسال - "Cloud Access Security Broker or
"Cloud Access Security Broker or CASB fits between a cloud customer and a cloud application, providing Identity and Access Management (IAM) services.

It is a defense-in-depth strategy for using cloud services; however, organizations still need traditional firewalls and intrusion prevention systems. CASB augments firewalls rather than replacing them.

Now, I will discuss certain functions provided by CASB and also its types of deployment models.

The first function is visibility. CASB monitors users and devices accessing cloud services, tracking the usage of cloud resources by different devices and users within your organization. It can also identify any shadow IT assets, providing visibility into users, devices, and all IT assets using cloud services.

The second function is compliance. CASB ensures compliance with regulations such as HIPAA, PCI DSS, or GDPR.

The third function is threat protection. CASB offers User and Entity Behavior Analytics (UEBA) to detect insider threats. It provides antivirus services, threat intelligence, and integrates with Security Information and Event Management (SIEM) systems to alert organizations of any security violations related to the cloud services they use.

The last function is data security. Organizations can enforce policies and standardized access controls for cloud service usage. CASB implements Single Sign-On (SSO) for accessing all cloud services, provides data leakage prevention (DLP) solutions, and offers key escrow services where the encryption keys reside with CASB, not the cloud service provider.

Now, regarding deployment types, there are four types:

Forward Proxy: Inspects and monitors cloud application usage by endpoints. Requires installing digital certificates on all endpoints for encrypted traffic monitoring.

Agent-Based: Agents deployed on each endpoint for in-line monitoring. Allows integration of antivirus and DLP solutions but may face scalability and performance issues.

Reverse Proxy: Agentless deployment that actively monitors cloud service usage. Can integrate with existing identity management solutions, offering scalability without endpoint agent deployment.

API-Based: Agentless and passive deployment where CASB monitors traffic passively. Works independently of device or user location but depends on API availability from cloud services.

These deployment types cater to different organizational needs for cloud security.

Thank you."
پارسال در تاریخ 1401/12/04 منتشر شده است.
119 بـار بازدید شده
... بیشتر